PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which tool should you use?

###BeginCaseStudy###
Case Study: 2
City Power & Light
Scenario:
You are an enterprise desktop support technician for City Power & Light. City Power &
Light is a utility company. The company has a main office and a branch office. The main
office is located in Toronto. The branch office is located in Boston. The main office has
1,000 employees. The branch office has 10 employees.
Active Directory Configuration
The network contains a single Active Directory domain named cpandl.com. The functional
level of the forest is Windows Server 2008 R2.
Server Configuration
All servers run Windows Server 2008 R2. The relevant servers in the main office are
configured as shown in the following table.

All computers in the main office are configured to use DHCP. All computers in the branch
office are configured to use static IP addresses.
User Information
• All user accounts are standard user accounts.
• All client computers run Windows 7 Enterprise.
• Each portable computer has a PPT P-based VPN connection to the internal network.
Corporate Security Guidelines
• All users must be granted the least privileges possible.
• All locally stored documents must be encrypted by using Encrypting File System
(EFS).
• The hard disk drives on all port able computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
• All encryption certificates must be stored on smart cards.

###EndCaseStudy###

The company implements a data recovery agent (DRA) for Bitlocker. A portable computer fails. The
help desk reports that it is unable to use the DRA to recover the data from the computer’s hard disk
drive. You need to ensure that the DRA can be used to recover data from the hard disk drives of all
portable computers. Which tool should you use?

You need to achieve this goal by using the minimum amount of administrative effort

###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.

The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###

Users in the research department report that they cannot run App1 or Windows XP Mode. You need
to ensure that all research department users can run App1. You need to achieve this goal by using
the minimum amount of administrative effort. What should you do?

What are two possible ways to achieve this goal?

###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.

The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###

Users in branch office 1 report that they fail to access the company’s intranet Web site located on
Web1. They also fail to access Web sites on the Internet. A desktop support technician restarts a
desktop computer in branch office 1 and discovers the IP configuration shown in the following
screenshot.

You need to resolve the network connectivity issue. What are two possible ways to achieve this
goal? (Each correct answer presents a complete solution. Choose two.)

What should you request?

###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.

The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###

Datum hires several consultants to work at the main office for six months. The consultants require
Internet access. The help desk reports that the consultants cannot access the company’s wireless
network. You need to ensure that the consultants have wireless access to the Internet. The solution
must adhere to the corporate security policy. What should you request?

What should you request?

###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.

The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###

The help desk reports that several client computers in branch office 1 are missing security updates.
You need to identify which security updates are missing. What should you request?

Which two configurations should you recommend?

###BeginCaseStudy###
Case Study: 3
A)
Datum Corporation
Scenario:
You are an enterprise desktop support technician for A. Datum Corporation.
Active Directory Configuration
The company has three offices. The offices are configured as shown in the following table.

The network contains a single Active Directory domain named adatum.com. Two Group
Policy objects (GPOs) are configured as shown in the following table.

The relevant servers in the main office are configured as shown in the following table.

Wireless Network
A wireless network is implemented in the main office. The wireless network is configured to
use WPA2-Enterprise security.
Client Configuration
All client computers run Windows 7 Enterprise and are configured to use DHCP. Windows
Firewall is disabled on all client computers. All computers in the research department have
Windows XP Mode and Windows Virtual PC installed. You deploy a custom Windows XP
Mode image to the research department computers. An application named App1 is installed
in the image.
Each research department computer has the following hardware:
• 4 GB of RAM
• Intel Core i7 processor
• 500 -GB hard disk drive
Corporate Security Policy
The corporate security policy includes the following requirements:
• Users without domain accounts must be denied access to internal servers.
• All connections to the company’s wireless access points must be encrypted.
• Only employees can be configured to have user accounts in the Active Directory
domain.
• The hard disk drives on all portable computers must be encrypted by using Windows
BitLocker Drive Encryption (BitLocker).
###EndCaseStudy###

The motherboard on a portable computer fails. The data on the computer’s hard disk drive cannot
be recovered. You need to recommend a solution to ensure that the data on hard disks can be
recovered if the motherboard on other portable computers fails Which two configurations should
you recommend? (Each correct answer presents part of the solution. Choose two.)

You need to ensure that the users can install the custom application

###BeginCaseStudy###
Case Study: 4
Margie’s Travel
Scenario:
You are an enterprise desktop support technician for Margie’s Travel. Margie’s Travel is a
company that specializes in booking travel for large corporations. The company has a main
office in New York and operates a call center in New York and a call center in Los Angeles.
The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional
level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as
shown in the following table.

All sites connect to each other by using high-speed WAN links.
Server Configuration
The relevant servers are configured as shown in the following table.

Security Configuration
The relevant security settings for the domain are configured as shown in the following table.

The relevant network policies on the NPS servers and the RRAS servers are configured as
shown in the following table.

User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and
uses portable computers. All portable computers are members of the MargiesTravel\Wireless
group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged
as an MSI file and is signed by using a code signing certificate that was issued by CA3. The
application is published by using Group Policies.

###EndCaseStudy###

The company hires an additional 100 users. The users are unable to install the custom application.
You need to ensure that the users can install the custom application. What should you do?

You need to ensure that the call center users can run all of the Office 2007 applications

###BeginCaseStudy###
Case Study: 4
Margie’s Travel
Scenario:
You are an enterprise desktop support technician for Margie’s Travel. Margie’s Travel is a
company that specializes in booking travel for large corporations. The company has a main
office in New York and operates a call center in New York and a call center in Los Angeles.
The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional
level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as
shown in the following table.

All sites connect to each other by using high-speed WAN links.
Server Configuration
The relevant servers are configured as shown in the following table.

Security Configuration
The relevant security settings for the domain are configured as shown in the following table.

The relevant network policies on the NPS servers and the RRAS servers are configured as
shown in the following table.

User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and
uses portable computers. All portable computers are members of the MargiesTravel\Wireless
group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged
as an MSI file and is signed by using a code signing certificate that was issued by CA3. The
application is published by using Group Policies.

###EndCaseStudy###

You deploy Microsoft Office 2007 to a pilot group in the main office. Users in the pilot group report
that all of the Office 2007 applications run successfully. You deploy Office 2007 to users in the New
York call center. The call center users report that they are unable to launch the Office 2007
applications. You need to ensure that the call center users can run all of the Office 2007 applications.
What should you do?

You need to ensure that all users can log on to their computers when DC3 is offline for maintenance

###BeginCaseStudy###
Case Study: 4
Margie’s Travel
Scenario:
You are an enterprise desktop support technician for Margie’s Travel. Margie’s Travel is a
company that specializes in booking travel for large corporations. The company has a main
office in New York and operates a call center in New York and a call center in Los Angeles.
The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional
level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as
shown in the following table.

All sites connect to each other by using high-speed WAN links.
Server Configuration
The relevant servers are configured as shown in the following table.

Security Configuration
The relevant security settings for the domain are configured as shown in the following table.

The relevant network policies on the NPS servers and the RRAS servers are configured as
shown in the following table.

User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and
uses portable computers. All portable computers are members of the MargiesTravel\Wireless
group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged
as an MSI file and is signed by using a code signing certificate that was issued by CA3. The
application is published by using Group Policies.

###EndCaseStudy###

At 08:00 on a Tuesday morning, an administrator in Site 3 takes DC3 offline to update the server.
Users in Site 3 report that they cannot log on to their computers. The users receive the following
error message: “Your account has time restrictions that prevent you from logging on at this time.
Please try again later.” You need to ensure that all users can log on to their computers when DC3 is
offline for maintenance. Your solution must adhere to the corporate security policies. What should
you do?

You need to give the consultants wireless access to the Internet

###BeginCaseStudy###
Case Study: 4
Margie’s Travel
Scenario:
You are an enterprise desktop support technician for Margie’s Travel. Margie’s Travel is a
company that specializes in booking travel for large corporations. The company has a main
office in New York and operates a call center in New York and a call center in Los Angeles.
The company has 1,000 employees.
Active Directory Configuration
The network contains an Active Directory forest named margiestravel.com. The functional
level of the forest is Windows Server 2008 R2. The Active Directory sites are configured as
shown in the following table.

All sites connect to each other by using high-speed WAN links.
Server Configuration
The relevant servers are configured as shown in the following table.

Security Configuration
The relevant security settings for the domain are configured as shown in the following table.

The relevant network policies on the NPS servers and the RRAS servers are configured as
shown in the following table.

User Information
All client computers run Windows 7 Professional. Sales staff is located in the main office and
uses portable computers. All portable computers are members of the MargiesTravel\Wireless
group.
Application Configuration
Call center staff uses a custom application to book airline tickets. The application is packaged
as an MSI file and is signed by using a code signing certificate that was issued by CA3. The
application is published by using Group Policies.

###EndCaseStudy###

You have two external consultants. The consultants use their own personal portable computers. The
consultant’s report that they are unable to connect to your wireless network. You need to give the
consultants wireless access to the Internet. The solution must prevent external consultants from
accessing internal resources. What should you do?